This book provides network managers, LAN administrators and small business operators with all they need to know to qinterconnectq multiple locations or travelling employees that need to access a single location. The operation and utilization of virtual private networks is discussed both in theory and practicality, covering the technical aspects associated with encryption and digital certificates as well as the manner by which readers can create VPNs using readily available products from Microsoft, Cisco, Checkpoint and possibly other vendors. The author was among the first to write about the concept of virtual private networking in a series of articles published over five years ago, and in the intervening years this has become a very hot topic - with the technology being increasing deployed by companies. Virtual Private Networking, by Gilbert Held, covers the technology and the theory, but also shows readers, through numerous examples, 'how to use ' the technology.In examining the fields in the Incoming-Call-Connected control message shown in Figure 4.16, the first five function as previously described. The Participant Call ID field is set to the value received in the Call ID field of the correspondinganbsp;...
|Title||:||Virtual Private Networking|
|Publisher||:||John Wiley & Sons - 2005-01-28|